Wednesday, 22 July 2020

Neural network

One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way they work to make machines that learn too, programming networks of artificial neurons called neural networks In the past 10 years, the best-performing artificial-intelligence systems — such as the speech recognizers on smartphones or Google’s latest automatic translator — have resulted from a technique called “deep learning.” Deep learning is in fact a new name for an approach to artificial intelligence called neural networks, which have been going in and out of fashion for more than 70 years. Neural networks were first proposed in 1944 by Warren McCullough and Walter Pitts, two University of Chicago researchers who moved to MIT in 1952 as founding members of what’s sometimes called the first cognitive science department. Neural nets were a major area of research in both neuroscience and computer science until 1969, when, according to computer science lore, they were killed off by the MIT mathematicians Marvin Minsky and Seymour Papert, who a year later would become co-directors of the new MIT Artificial Intelligence Laboratory.

Thursday, 29 August 2019

SOFTWARE PIRACY AND ETHICAL HACKING

The act of copying software without being authorized for its uses its termed as software piracy if some needs to use particular software He need to buy it's uses authentication one must kept in mind That Laing before using permit it's uses how ever it does not make the owner of the particular software Ethical is conducted In an organizational manner the system and application that needs to be tested are determined by analysing requirement of client Ethical hacker must follow the activity to ensure that ethical and moral rule are met 1. Take authorization permission and get a singed contract from the client that given Permission to the tester to perform the test Sign is non-disclosure agreement with the client .in case of any confidential information need to be disclose during testing

Tuesday, 6 August 2019

HACKER BLACK HAT

A black hat hacker (or black-hat hacker) is a hacker who violates computer security for personal gain or maliciousness. The term's origin is often attributed to hacker culture theorist Aniket (though he denies coining it) to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair.[2] The black hat/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively Black hat hackers are the stereotypical illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal" Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users

Wednesday, 29 May 2019

Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.
Motto: We Are Anonymous
Membership: Decentralized affinity group
Purpose: Anti-cyber-surveillance; Anti-cyber-censorship; Internet activismInternet vi...
Region served: Global

Saturday, 18 May 2019

SECURITY MECHANISM

These are the step to prevent from hacking

.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding

  • .Routing control 


Encipherment
is type of security mechanism  in  Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
   it maintain the authenticity and intigirity  in digital signature  when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential  and which is not and in this manner we control the access to data
and  manage that which data are for public access and which data is private access

Authentication exchange
Authentication exchange are used for to identify the authenticated user  by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand  what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer

Wednesday, 15 May 2019

CRYPTOGRAPHY & SECURITY ATTACKS

First we discussed about what is cryptography 
Its the secure communication from sender  to receiver  in the persence of third party by using encryption keys that is public key and private key if the data is ecrypted by using private then the message or data will be decrypted only with public key 
And if the data is encrypted with the public key then it will be decrypted with  private key it is the main concept of encryption and decryption 

Security attacks in computer language  its define as the unauthorized access to the system by sending sime malecious and virus  there are two type of security attacks 

● passive
  Passive attack have two sub category
  . Release of message content 
  . Traffic analysis 
 
● active  
   In active attack data stolen from the middle of path and its able to modify and add some new bit with original message. 
In the active attack message is not in its original form it becom crrupted 

●Passive attacks 
In this types of attack haker or intrudure only read the data it  is not able to modify or edit the real message  sender send the message and receiver authorizes to get message but third party steal the message from the path 
By the help of traffic analysis  
Hacker can track the path that from where the data is being send and to the whome it is being deliverd  by the help of traffic analysis 

Neural network

One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way th...